CarahCast is Carahsoft’s new podcast channel dedicated to bringing our listeners the latest in Government IT case studies, technology trends, recent legislation news, and Government IT best practices.
Ensure the Success of Fiscal Year Spend by Focusing on End User Experiences
55:01Join Carahsoft and Riverbed Technology for an informed and engaging discussion led by Donald Kyzar, former CIO, Department of Justice’s Office of Inspector General and Marlin McFate, Riverbed’s Public Sector CTO about how federal agencies can cost effectively ensure the productivity, performance, and experiences of end users, applications, remote workforces, citizen-facing services, and IT investments with Digital Experience Monitoring (DEM) solutions.
Verpasse keine Episode von “CarahCast: Podcasts on Technology in the Public Sector” und abonniere ihn in der kostenlosen GetPodcast App.
CyberTalks with the CISO with Venafi
49:53Stream Venafi’s latest podcast to hear from former USPS CISO, Greg Crabb as he presents his analysis and recommendations for Improving Your Federal Cybersecurity Practice in 2022. In this podcast, Greg Crabb will review the impacts of recent events and makes recommendations for planning for 2022.
Bridging the Gaps of Cybersecurity with Cofense
37:03Threat actors are evolving, preying on end users with clever, relevant, and timely phishing attacks, with no signs of slowing down or stopping. Listen in to hear how agencies can bridge the gaps in the prioritization of investments in phishing protection solutions.
Aligning ICAM, the Executive Order, and Zero Trust for the Defense Department
57:33In our rapidly changing digital world, agencies must evolve security strategies. A goal of Zero Trust is to create a security and network architecture that is dynamic, adaptable, and protected. The Executive Order on Cybersecurity has moved the term “Zero Trust” from a buzzword to a much-needed baseline for action planning around how we secure agency data and systems. Agencies must leverage Zero Trust principles to never trust, always verify, and only allow access when contextual parameters are met. Identity sits at the heart of Zero Trust. In a perimeter-less world, agencies must protect identities to stop adversaries from getting into our networks, moving laterally, escalating privileges, and ultimately accessing and manipulating our data. Leveraging ICAM and robust identity security strategies enables agencies to move from a network-based approach to a data-centric approach to defending systems. Join government security experts for a discussion to understand: Why Privileged Access Management (PAM) is essential to major DoD initiatives like ICAM, Thunderdome, and Zero TrustHow ICAM supports the Executive OrderThe Defense Department’s outlook on data-centric security and defending agency systemsThe path to secure modernization using Least Privilege
Zero Trust and Your Agency: What It Will Take to Put Theory Into Practice with AvePoint
51:13Zero Trust is essential for modern security architecture and a core protection framework for agile growth. Unlike old models that assume a level of trust once an asset is approved, Zero Trust never stops reviewing the asset as a potential threat. With this framework in mind, the White House released a new Executive Order to implement Zero Trust Architecture (ZTA) strategies across all federal agencies by the end of the Fiscal Year 2024.
Mission First Podcast Series: Cybersecurity, From the White House to the Mission
32:19Catch episode four of Mission First, our Department of Defense (DoD) and National Security podcast series focusing on the mission, not products. During this session, Rob Thorne, Chief Information Security Officer, Immigration and Customs Enforcement (ICE) and Craig Bowman, Senior Director - Federal, VMware, will discuss:The biggest strengths and weaknesses in government cybersecurityHow much Zero Trust is possible in an agency with aging infrastructure and limited budgetWhat the Chief Information Security Officer's role is in shaping your organization's security strategyTune into our monthly podcast series, Mission First, where we will be focusing on the Department of Defense and National Security mission and not products. Hear from thought-leaders in the industry as they discuss complex challenges and topics buzzing within federal government IT.
Add an Early Warning System to Your Security Environment with Mandiant
25:46From Log4J to hybrid work models, the evolving and dynamic IT environment expands the attack surface creating more vulnerabilities and risks for public sector organizations. This podcast will help you understand the cyber security challenges Attack Surface Management (ASM) solves and how it can be easily integrated into any cyber defense program. ASM can provide comprehensive visibility of your environment, while continuously discovering and analyzing assets to monitor them for risks. Listen to this podcast to hear insight on how ASM can help government agencies become more resilient by: Detecting infrastructure changes and exposures in real-time Managing cloud computing and shadow IT Embedding governance into workflows Building supply chain resilience Extending security policy outside the enterprise